Local privilege escalation in snapd on Linux allows local...
High severity
Unreviewed
Published
Mar 17, 2026
to the GitHub Advisory Database
•
Updated Mar 18, 2026
Description
Published by the National Vulnerability Database
Mar 17, 2026
Published to the GitHub Advisory Database
Mar 17, 2026
Last updated
Mar 18, 2026
Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.
References